# Some facets of complexity theory and cryptography: A five-lecture tutorial

@article{Rothe2002SomeFO, title={Some facets of complexity theory and cryptography: A five-lecture tutorial}, author={J. Rothe}, journal={Electron. Colloquium Comput. Complex.}, year={2002} }

In this tutorial, selected topics of cryptology and of computational complexity theory are presented. We give a brief overview of the history and the foundations of classical cryptography, and then move on to modern public-key cryptography. Particular attention is paid to cryptographic protocols and the problem of constructing key components of protocols such as one-way functions. A function is one-way if it is easy to compute, but hard to invert. We discuss the notion of one-way functions both… Expand

#### Figures, Tables, and Topics from this paper

#### 25 Citations

6 Introduction to Cryptography 6.1 Symmetric Cryptosystems

This section gives a short introduction to cryptography. It is based on the recent tutorial by Jörg Rothe. For an in-depth treatment of cryptography, please consult the Handbook of Applied… Expand

Quantum Cryptography: A New Generation of Information Technology Security System

- Computer Science
- 2009 Sixth International Conference on Information Technology: New Generations
- 2009

This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards. Expand

Quantum cryptography: An emerging technology in network security

- Computer Science
- 2011 IEEE International Conference on Technologies for Homeland Security (HST)
- 2011

The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, the future direction in which the quantum cryptography is headed forwards. Expand

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

- 2013

For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging… Expand

Applicability of Cellular Automata in Cryptanalysis

- Computer Science
- Int. J. Appl. Metaheuristic Comput.
- 2017

An extensive literature review of the cryptanalysis techniques is carried out, finds the gaps there in, in order to put the proposed technique in the perspective and also finds the applicability of Cellular Automata in cryptanalysis. Expand

An Efficient Algorithm for Isomorphic Problem on Generic Simple Graphs

- Computer Science, Mathematics
- 2008 Second Asia International Conference on Modelling & Simulation (AMS)
- 2008

Algorithm proposed is applied to undirected simple graphs so that (u, v) and (v, u) are considered to be the same edge and can be used into authentication methods based on graph isomorphism. Expand

A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography

- Computer Science
- 2016

This paper proposes integration of Advanced Encryption Standard (AES) algorithm with quantum cryptography, and shows that the Quantum AES produces complex keys which are hard to predict by adversaries than the keys generated by the AES itself. Expand

Identity based secure authentication scheme based on quantum key distribution for cloud computing

- Computer Science
- Peer Peer Netw. Appl.
- 2018

A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme and proves that it is robust against all security attacks. Expand

A client/server implementation of an encryption system for fingerprint user authentication

- Computer Science
- Kybernetes
- 2008

A client/server architecture to efficiently authenticate users by means of their fingerprint biometric feature is proposed and the results of the experiments show that such architecture is optimal for being applied. Expand

Butterfly: Privacy Preserving Publishing on Multiple

- Computer Science
- 2009

It is shown that it is possible to generate only one anonymized table to satisfy the k-anonymity on all quasi-identifiers for all users without significant information loss. Expand

#### References

SHOWING 1-10 OF 172 REFERENCES

Public-Key Cryptography

- Computer Science
- EATCS Monographs on Theoretical Computer Science
- 1990

This book gives a broad overview of public-key cryptography - its essence and advantages, various public- key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. Expand

One-way functions in worst-case cryptography: algebraic and security properties are on the house

- Computer Science, Mathematics
- SIGA
- 1999

Until recently, it was an open question whether one- way functions having the algebraic and security properties that these protocols require could be created from any given one-way function, and recently, Hemaspaandra and Rothe resolved this open issue in the affirmative, by showing that one-Way functions exist if and only if strong, total, commutative, associative one-ways exist. Expand

Pseudorandomness and cryptographic applications

- Mathematics, Computer Science
- Princeton computer science notes
- 1996

The first half of the book shows how to construct a pseudorandom generator from any one-way function, and builds on this to construct other useful cryptographic primitives, such as private key cryptosystems,pseudorandom function generators, pseud orandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. Expand

Decrypted secrets - methods and maxims of cryptology

- Computer Science
- 1997

This 3rd edition of "Decrypted Secrets" has become a standard book on cryptology and has again been revised and extended in many technical and biographical details. Expand

Public Key Cryptography

- Computer Science
- Lecture Notes in Computer Science
- 2000

This talk focuses on the RSA Public Key Cryptosystem, a cryptographic system in which each encryption process is governed by not one but two keys, which allows one of the keys to be made public while its inverse is kept secret, giving the systems their name. Expand

Associative one-way functions: a new paradigm for secret-key agreement and digital signatures

- Mathematics
- 1993

We propose associative one-way functions as a new cryptographic paradigm for exchanging secret keys and for signing digital documents. First, we precisely deene these functions and establish some of… Expand

Contemporary Cryptology: The Science of Information Integrity

- Engineering
- 1994

From the Publisher:
The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In… Expand

On characterizing the existence of partial one-way permutations

- Mathematics, Computer Science
- Inf. Process. Lett.
- 2002

It is shown that the existence of partial one-way permutations can be characterized by separating P from the class of UP sets that, for all unambiguous polynomial-time Turing machines accepting them, always have easy (i.e., polynometric-time computable) certificates. Expand

Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems

- Computer Science, Mathematics
- JACM
- 1991

In this paper the generality and wide applicability of Zero-knowledge proofs, a notion introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and interactive proofs… Expand

Some facets of complexity theory and cryptography

- Computer Science
- 2002

This tutorial gives a brief overview of the history and the foundations of classical cryptography, and then presents topics of cryptology and of computational complexity theory. Expand